{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T14:58:54Z","timestamp":1771340334052,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,12,28]],"date-time":"2014-12-28T00:00:00Z","timestamp":1419724800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s10676-014-9359-0","type":"journal-article","created":{"date-parts":[[2014,12,27]],"date-time":"2014-12-27T12:27:03Z","timestamp":1419683223000},"page":"27-39","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Discourse ethics for computer ethics: a heuristic for engaged dialogical reflection"],"prefix":"10.1007","volume":"17","author":[{"given":"William","family":"Rehg","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,28]]},"reference":[{"key":"9359_CR1","unstructured":"Administration White Paper. (2013). Bulk collection of telephony metadata under section\u00a0215 of the USA Patriot Act. http:\/\/perma.cc\/8RJN-EDB7?type=pdf . Downloaded 28 June 2014."},{"key":"9359_CR2","first-page":"151","volume-title":"The communicative ethics controversy","author":"R Alexy","year":"1990","unstructured":"Alexy, R. (1990). A theory of practical discourse. In S. Benhabib & F. Dallmayr (Eds.), The communicative ethics controversy (pp. 151\u2013190). Cambridge: MIT Press."},{"issue":"5","key":"9359_CR3","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1111\/1467-9280.00366","volume":"12","author":"CA Anderson","year":"2001","unstructured":"Anderson, C. A., & Bushman, B. J. (2001). Effects of violent video games on aggressive behavior, aggressive cognition, aggressive affect, physiological arousal, and prosocial behavior: A meta-analytic review of the scientific literature. Psychological Science, 12(5), 353\u2013359.","journal-title":"Psychological Science"},{"key":"9359_CR4","unstructured":"Apel, K.-O. (1980). Towards a transformation of philosophy. (G. Adey and D. Frisby, Trans.).\u00a0Routledge and Kegan Paul: London."},{"key":"9359_CR5","volume-title":"Situating the self","author":"S Benhabib","year":"1992","unstructured":"Benhabib, S. (1992). Situating the self. New York: Routledge."},{"key":"9359_CR6","first-page":"91","volume-title":"Readings in cyberethics","author":"FAJ Birrer","year":"2001","unstructured":"Birrer, F. A. J. (2001). Applying ethical and moral concepts and theories to IT contexts: Some key problems and challenges. In R. A. Spinello & H. T. Tavani (Eds.), Readings in cyberethics (pp. 91\u201397). Boston: Jones and Bartlett."},{"key":"9359_CR7","unstructured":"Bushman, B. J. (2013). Don\u2019t buy your kid Grand Theft Auto V for Christmas. Huff Post Tech, 13 Dec 2013. http:\/\/www.huffingtonpost.com\/brad-j-bushman\/dont-buy-your-kid-grand-theft-auto-v-for-christmas_b_4440477.html . Accessed 19 Feb 2014."},{"key":"9359_CR8","unstructured":"Clarke, R. A., Morell, M. J., Stone, G. R., Sunstein, C. R., & Swire, P. (2013). Liberty and security in a changing world: Report and recommendations of the president\u2019s review group on intelligence and communications technologies. http:\/\/www.whitehouse.gov\/sites\/default\/files\/docs\/2013-12-12_rg_final_report.pdf . Downloaded 21 June 2014."},{"key":"9359_CR9","unstructured":"ESBR (2014a) ESBR ratings guide. http:\/\/www.esrb.org\/ratings\/ratings_guide.jsp . Accessed 5 August 2014."},{"key":"9359_CR10","unstructured":"ESBR. (2014b). Principles and guidelines for responsible advertising practices. http:\/\/www.esrb.org\/ratings\/principles_guidelines.jsp . Accessed 5 August 2014."},{"key":"9359_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/9780470281819.ch1","volume-title":"The handbook of information and computer ethics","author":"L Floridi","year":"2008","unstructured":"Floridi, L. (2008). Foundations of information ethics. In K. E. Himma & H. T. Tavani (Eds.), The handbook of information and computer ethics (pp. 1\u201323). Hoboken, NJ: Wiley."},{"issue":"4","key":"9359_CR12","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1177\/1948550613509286","volume":"5","author":"A Gabbiadini","year":"2014","unstructured":"Gabbiadini, A., Riva, P., Andrighetto, L., Volpato, C., & Bushman, B. J. (2014). Interactive effect of moral disengagement and violent video games on self-control, cheating, and aggression. Social Psychological and Personality Science, 5(4), 451\u2013458.","journal-title":"Social Psychological and Personality Science"},{"key":"9359_CR13","unstructured":"Gellman, B., & Poitras, L. (2013). U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program, Washington Post, 7 June 2013. www.washingtonpost.com\/investigations\/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program\/2013\/06\/06\/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html . Accessed 20 June 2014."},{"key":"9359_CR14","unstructured":"Gorban, S., & Barrett, D. (2013). \u201cNSA violated privacy protections, official says.\u201d Washington Post, 10 Sept 2013. http:\/\/online.wsj.com\/news\/articles\/SB10001424127887324094704579067422990999360 . Accessed 21 June 2014."},{"key":"9359_CR15","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1002\/9780470281819.ch18","volume-title":"The handbook of information and computer ethics","author":"D Gotterbarn","year":"2008","unstructured":"Gotterbarn, D., Clear, T., & Kwan, C.-T. (2008). A practical mechanism for ethical risk assessment\u2014A SoDIS inspection. In K. E. Himma & H. T. Tavani (Eds.), The handbook of information and computer ethics (pp. 429\u2013471). Hoboken, NJ: Wiley."},{"key":"9359_CR16","volume-title":"No place to hide","author":"G Greenwald","year":"2014","unstructured":"Greenwald, G. (2014). No place to hide. New York: Metropolitan-Henry Holt."},{"key":"9359_CR17","doi-asserted-by":"crossref","first-page":"1348","DOI":"10.1016\/j.chb.2012.02.020","volume":"28","author":"WD Gunter","year":"2012","unstructured":"Gunter, W. D., & Daly, K. (2012). Causal or spurious: Using propensity score matching to disentangle the relationship between violent video games and violent behavior. Computers in Human Behavior, 28, 1348\u20131355.","journal-title":"Computers in Human Behavior"},{"key":"9359_CR18","unstructured":"Habermas, J. (1990). Moral consciousness and communicative action. (C. Lenhardt and S. W. Nicholsen Trans.). Cambridge: MIT Press."},{"key":"9359_CR19","unstructured":"Habermas, J. (1993). Justification and application. (C. Cronin Trans.). Cambridge: MIT Press."},{"key":"9359_CR20","doi-asserted-by":"crossref","unstructured":"Habermas, J. (1996). Between facts and norms. (W. Rehg Trans.). Cambridge: MIT Press.","DOI":"10.7551\/mitpress\/1564.001.0001"},{"key":"9359_CR21","unstructured":"Habermas, J. (1998). The inclusion of the other. (Ed.) Cronin, C., & De Greiff, P. Cambridge: MIT Press."},{"key":"9359_CR22","unstructured":"Harty, J. M. (1911). Probabilism. In Catholic encyclopedia (Vol. 12, pp. 441\u2013446). New York: Robert Appleton."},{"issue":"1","key":"9359_CR23","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1177\/019145379502100105","volume":"21","author":"J Heath","year":"1995","unstructured":"Heath, J. (1995). The problem of foundationalism in Habermas\u2019s discourse ethics. Philosophy and Social Criticism, 21(1), 77\u2013100.","journal-title":"Philosophy and Social Criticism"},{"key":"9359_CR24","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1046\/j.1365-2575.2003.00144.x","volume":"13","author":"MSH Heng","year":"2003","unstructured":"Heng, M. S. H., & de Moor, A. (2003). From Habermas\u2019s communicative theory to practice on the internet. Information Systems Journal, 13, 331\u2013352.","journal-title":"Information Systems Journal"},{"key":"9359_CR25","first-page":"1871","volume":"127","author":"HLR","year":"2014","unstructured":"HLR. (2014). Recent administration white paper. Harvard Law Review, 127, 1871\u20131878.","journal-title":"Harvard Law Review"},{"key":"9359_CR53","unstructured":"Kant, I. (1994).\u00a0Grounding for the Metaphysics of Morals. In Kant (Ed.), Ethical Philosophy (2nd ed.), (J. W. Ellington Trans.). Indianapolis: Hackett."},{"key":"9359_CR26","unstructured":"Kirk, M. (director) (2014) The United States of secrets. Frontline, 2 parts, May 15, May 20, 2014."},{"key":"9359_CR27","unstructured":"Lanier, J. (2014) Should Facebook manipulate its users? New York Times, 1 July 2014, A17."},{"key":"9359_CR28","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780199591565.001.0001","volume-title":"Group agency","author":"C List","year":"2011","unstructured":"List, C., & Pettit, P. (2011). Group agency. Oxford: Oxford University Press."},{"key":"9359_CR29","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1525\/9780520917613-007","volume-title":"Habermas on law and democracy","author":"T McCarthy","year":"1998","unstructured":"McCarthy, T. (1998). Legitimacy and diversity: Dialectical reflections on analytic distinctions. In M. Rosenfeld & A. Arato (Eds.), Habermas on law and democracy (pp. 115\u2013153). Berkeley: University of California Press."},{"key":"9359_CR30","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1023\/A:1013802119431","volume":"3","author":"M McCormick","year":"2001","unstructured":"McCormick, M. (2001). Is it wrong to play violent video games? Ethics and Information Technology, 3, 277\u2013287.","journal-title":"Ethics and Information Technology"},{"key":"9359_CR31","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1086\/233322","volume":"110","author":"C McMahon","year":"2000","unstructured":"McMahon, C. (2000). Discourse and morality. Ethics, 110, 514\u2013536.","journal-title":"Ethics"},{"key":"9359_CR32","unstructured":"Medine, D., Brand, R., Cook, E. C., Dempsey, J., & Wald, P. (2014). Report on the surveillance program operated pursuant to section\u00a0702 of the foreign intelligence surveillance act. Privacy and Civil Liberties Oversight Board. 2 July 2014. http:\/\/www.pclob.gov\/All%20Documents\/Report%20on%20the%20Section%20702%20Program\/PCLOB-Section-702-Report.pdf . Accessed 4 July 2014."},{"issue":"4","key":"9359_CR33","doi-asserted-by":"crossref","first-page":"833","DOI":"10.2307\/25750707","volume":"34","author":"J Mingers","year":"2010","unstructured":"Mingers, J., & Walsham, G. (2010). Towards ethical information systems: The contribution of discourse ethics. MIS Quarterly, 34(4), 833\u2013854.","journal-title":"MIS Quarterly"},{"issue":"3","key":"9359_CR34","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/270858.270866","volume":"27","author":"J Moor","year":"1997","unstructured":"Moor, J. (1997). Towards a theory of privacy in the information age. Computers and Society, 27(3), 27\u201332.","journal-title":"Computers and Society"},{"key":"9359_CR35","first-page":"65","volume":"1","author":"J Moor","year":"1999","unstructured":"Moor, J. (1999). Just consequentialism and computing. Ethics and Information Technology, 1, 65\u201369.","journal-title":"Ethics and Information Technology"},{"issue":"4","key":"9359_CR36","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1080\/10888690903288748","volume":"13","author":"CK Olson","year":"2009","unstructured":"Olson, C. K., Kutner, L. A., Baer, L., Beresin, E. V., Warner, D. E., & Nicholi, A. M, I. I. (2009). M-rated video games and aggressive or problem behavior among young adolescents. Applied Developmental Science, 13(4), 188\u2013198.","journal-title":"Applied Developmental science"},{"key":"9359_CR37","doi-asserted-by":"crossref","DOI":"10.1525\/9780520919174","volume-title":"Insight and solidarity","author":"W Rehg","year":"1994","unstructured":"Rehg, W. (1994). Insight and solidarity. Berkeley: University of California Press."},{"key":"9359_CR38","first-page":"83","volume-title":"The ethical","author":"W Rehg","year":"2003","unstructured":"Rehg, W. (2003). Discourse ethics. In E. Wyschogrod & G. P. McKenny (Eds.), The ethical (pp. 83\u2013100). Malden, MA: Blackwell."},{"key":"9359_CR39","first-page":"1","volume-title":"NSA intelligence collection, leaks, and the protection of classified information","author":"JW Rollins","year":"2014","unstructured":"Rollins, J. W., & Liu, E. C. (2014). NSA surveillance leaks: Background and issues for Congress. In S. Cepeda (Ed.), NSA intelligence collection, leaks, and the protection of classified information (pp. 1\u201327). NY: Nova."},{"key":"9359_CR40","unstructured":"Sanger, D. E. (2014). Sky isn\u2019t falling after Snowden, N.S.A. chief says. New York Times, 30 June 2014, A1, A13."},{"key":"9359_CR41","unstructured":"Schiesel, S. (2011). Supreme court has ruled; now games have a duty. New York Times, 28 June 2011. http:\/\/www.nytimes.com\/2011\/06\/29\/arts\/video-games\/what-supreme-court-ruling-on-video-games-means.html . Accessed 11 July 2014."},{"key":"9359_CR42","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/9780262012652.001.0001","volume-title":"The ethics of computer games","author":"M Sicart","year":"2009","unstructured":"Sicart, M. (2009). The ethics of computer games. Cambridge: MIT Press."},{"key":"9359_CR43","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-59140-172-8","volume-title":"Responsible management of information systems","author":"BC Stahl","year":"2004","unstructured":"Stahl, B. C. (2004). Responsible management of information systems. Hershey, PA: Idea Group Publishing."},{"key":"9359_CR44","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s10676-008-9171-9","volume":"10","author":"BC Stahl","year":"2008","unstructured":"Stahl, B. C. (2008). Discourses on information ethics: the claim to universality. Ethics and Information Technology, 10, 97\u2013108.","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"9359_CR45","doi-asserted-by":"crossref","first-page":"33","DOI":"10.5840\/beq20091912","volume":"19","author":"J Stansbury","year":"2009","unstructured":"Stansbury, J. (2009). Reasoned moral agreement: Applying discourse ethics within organizations. Business Ethics Quarterly, 19(1), 33\u201356.","journal-title":"Business Ethics Quarterly"},{"key":"9359_CR46","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1002\/9780470281819.ch6","volume-title":"The handbook of information and computer ethics","author":"HT Tavani","year":"2008","unstructured":"Tavani, H. T. (2008). Informational privacy: Concepts, theories, and controversies. In K. E. Himma & H. T. Tavani (Eds.), The handbook of information and computer ethics (pp. 131\u2013164). Hoboken, NJ: Wiley."},{"key":"9359_CR47","volume-title":"Ethics and technology","author":"HT Tavani","year":"2011","unstructured":"Tavani, H. T. (2011). Ethics and technology. Hoboken: Wiley."},{"key":"9359_CR48","first-page":"113","volume-title":"Persistence of modernity","author":"A Wellmer","year":"1991","unstructured":"Wellmer, A. (1991). Ethics and dialogue: Elements of moral judgment in Kant and discourse ethics. In D. Midgley (Ed.), Persistence of modernity (pp. 113\u2013231). Cambridge: MIT Press."},{"issue":"1","key":"9359_CR49","first-page":"19","volume":"10","author":"P-H Wong","year":"2012","unstructured":"Wong, P.-H. (2012). A Walzerian approach to ICTs and the good life. Journal of Information, Communication, and Information in Society, 10(1), 19\u201335.","journal-title":"Journal of Information, Communication, and Information in Society"},{"key":"9359_CR50","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1007\/s10676-010-9242-6","volume":"13","author":"D Wright","year":"2011","unstructured":"Wright, D. (2011). A framework for the ethical impact assessment of information technology. Ethics and Information Technology, 13, 199\u2013226.","journal-title":"Ethics and Information Technology"},{"key":"9359_CR51","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1057\/palgrave.ejis.3000595","volume":"15","author":"F Yetim","year":"2006","unstructured":"Yetim, F. (2006). Acting with genres: Discursive-ethical concepts for reflecting on and legitimating genres. European Journal Of Information Systems, 15, 54\u201369.","journal-title":"European Journal Of Information Systems"},{"issue":"2","key":"9359_CR52","doi-asserted-by":"crossref","first-page":"133","DOI":"10.17705\/1thci.00030","volume":"3","author":"F Yetim","year":"2011","unstructured":"Yetim, F. (2011). Bringing discourse ethics to value sensitive design: Pathways toward a deliberative future. AIS Transactions On Human-Computer Interaction, 3(2), 133\u2013155.","journal-title":"AIS Transactions On Human-Computer Interaction"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-014-9359-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-014-9359-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-014-9359-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T13:33:40Z","timestamp":1650893620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-014-9359-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,28]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["9359"],"URL":"https:\/\/doi.org\/10.1007\/s10676-014-9359-0","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,28]]}}}